Model of Defensive Information Avoidance
A Model of Defensive Information Avoidance in Information Systems Use Research-in-Progress
Tillmann Neben University of Mannheim Mannheim, Germany
[email protected] This paper looks at defensive information avoidance: the phenomenon that users avoid decision-relevant but incongruent information. Since only utilized information can contribute to better decision-making, the phenomenon of information avoidance is of great relevance to the information systems discipline. This paper contributes the first coherent conceptualization of information avoidance behavior by synthesizing scattered but related definitions. Building on this, it proposes a theoretical model and explains how encountering decision-relevant but incongruent information relates to different avoidance behaviors. In particular, it helps to understand yet unexplained IS use phenomena, where encountering incongruent information – paradoxically – leads to a higher information exposure but a decreased information absorption and use. The paper contributes methodologically by proposing a series of neurophysiological measures for testing the explanatory model. It derives and discusses two experimental paradigms from experimental psychology for testing the hypothesized effects. Keywords: Information avoidance, information pathologies, NeuroIS
Introduction This paper investigates why users avoid decision-relevant information. It explains how incongruent information leads to the perception of dissonance and to defensive avoidance reactions. Information is incongruent if it mismatches prior beliefs, decisions, or knowledge. The effects of incongruence and dissonance on user behavior are relevant to information systems (IS) research for two reasons. First, past research has focused on syntactic and semantic information characteristics and their effect on cognitive load (Huang 2000; Jacoby 1984) but little is known about how deficits on the pragmatic level of information relate to negative affect and changes in human information processing (Bawden and Robinson 2008; Nahl and Bilal 2007). Second, because the chance of encountering incongruent information increases with the constantly growing amount of available information, understanding how information characteristics affect information behaviors is of increasing relevance (Floridi 2009). The study, thus, relates to recent research on user behavior and effective use (Burton-Jones and Grange 2013; Pavlou et al. 2008). However, it is original because its dependent variable is not decision efficiency and quality, but pathologies in information processing. This is grounded in the insight that information needs to be processed before it can affect decision quality (Witte et al. 1972), or in a broader sense, affect IS phenomena, such as knowledge management, information management, or organizational learning. In other words, users that avoid relevant information are less likely to make optimal decisions. This paper proposes a model of defensive information avoidance. In order to do this, it investigates changes in human behavior in response to encountering unpleasant or threatening information. Past research on information avoidance is scattered and no unified conceptualization of information avoidance exists. Various researchers define it as the avoidance of reading (Bodenhausen and Wyer 1987; Guo et al. 2005), search (Bhatia 2014; Hong 2014), usage (Diamantopoulos and Souchon 1999), or sharing
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
1
Model of Defensive Information Avoidance
(Connelly et al. 2012) of information. However, a clear-cut definition of the construct is a prerequisite for theorizing its explanation. Thus, the first research question for this paper is: RQ1: How can information avoidance behavior be conceptualized and what specific subtypes of avoidance behaviors exist? This paper wants to explain how information characteristics cause defensive avoidance reactions. Past research has not explained which characteristics of the information relate to defensive avoidance behaviors. Accordingly, and following Floridi’s (2009) call for investigating how information characteristics relate to human behaviors, the second research question is: RQ2: Which information characteristics relate to defensive information avoidance behaviors? Since past studies present contradicting explanations for defensive avoidance behaviors, this paper unifies a wide range of psychological theories into a coherent model. The third research question is: RQ3: What are the psychological explanations for defensive avoidance behaviors?
Literature Review To study misguided and dysfunctional information behaviors, past research established the notion of information pathologies (Scholl 2004; Selke 2006) and biases (Tversky and Kahneman, 1973). They describe behaviors that result in relevant information not being shared, read, or used (Scholl 2004; Selke 2006; similar see Browne et al. 2007). The literature reveals a dichotomy of the underlying causes of information avoidance: on the one hand, psychological explanations are based on the perception of fear, anger, doubt, and anxiety. These explanations are based on the idea that a particular piece of information is perceived as a threat (Jonas et al. 2001). On the other hand, psychological explanations are based on the concept of mental overload. These explanations relate to the idea that a particular piece of information causes increased mental effort (Malhotra et al. 1982). While reference disciplines such as psychology have a cumulative research tradition concerning related phenomena, the IS discipline lacks systematic research where avoidance of information is the dependent variable (Neben et al. 2013; similar see Hemmer and Heinzl 2011). Reviewing the reference disciplines revealed that only a few studies have looked at information avoidance in a holistic manner and have considered different causes, in addition to different manifestations of the avoidance phenomenon (Wang and Domas 1999; Melnyk 2009; Sweeny et al. 2010; Sweeny and Miller 2012). Most studies focus on specific aspects of the phenomenon (Howell and Shepperd 2012) or specific behaviors, such as the avoidance of searching or the avoidance of articulating an information need (Case et al. 2005). A broad research stream is concerned with selective exposure, which relates to behaviors aimed at preventing confrontation with specific information (Cotton and Hieser 1980; Fischer and Greitemeyer 2010; Fischer, Schulz-Hardt, et al. 2008; Garrett 2013; Kastenmüller et al. 2013; KnoblochWesterwick and Meng 2009; Sears and Freedman 1967). Other studies are concerned with the subtypes of use avoidance (Choo et al. 2008; Greenwald 1997; Menon and Varadarajan 1992; Narayan et al. 2011) or the avoidance of adequate information absorption (Beevers and Scott 2001; Bodenhausen and Wyer 1987; Guo et al. 2005). Confirmatory search refers to a search for supporting information after making a decision (Scherer et al. 2013). Theoretically, this is different from the concept of selective exposure, which does not describe the information search, but the information selection (Fischer et al. 2005). However, several studies diverge from this definition and include the notion of active search in their conceptualization of selective exposure (Valentino et al. 2009). Information non-use involves preventing the information from actively and purposefully leading to specific decisions, actions, or thoughts (Dervin 1998; Greenwald 1997; Todd 1999). Blunting refers to avoidance reactions when stumbling over information that is perceived negatively (Sexton and Dugas 2008; Van Zuuren and Wolfs 1991). A frequently cited definition of information avoidance is based on the work of Sweeny et al. (2010) which defines information avoidance as any behavior directed at preventing or delaying the acquisition of available but potentially unwanted information. Interestingly, this definition does not require the information to be useful and decision-relevant. However, in order to distinguish information avoidance behavior from related phenomena, such as lack of interest, time pressure, and economically sound
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
2
Model of Defensive Information Avoidance
behaviors, such as the avoidance of irrelevant information (Poulsen and Roos 2010), some researchers require the avoided information to be decision-relevant (Narayan et al. 2011; Scholl 2004). Furthermore, the definition refers to information acquisition, but omits other potentially relevant information behaviors, such as information use (Melnyk 2009). Since the literature is inconsistent concerning the conceptualization and delineation of the phenomenon, it remains inconclusive in explaining the involved psychological processes and their relation to information, tasks, and system characteristics. Most studies explicitly or implicitly build on coping theory and the notion that a stimulus goes through several phases of appraisal (Roth and Cohen 1986; Smith and Lazarus 1993). Explanations that relate to defensive information avoidance are often grounded in theories of cognitive dissonance, ego-defense, and anxiety. Several moderators have been discussed, for example, differences in personality (Hart et al. 2012; Miller 1987), different coping styles, and personal uncertainty orientation (Brouwers and Sorrentino 1993; Sorrentino et al. 1988; 1995). Other scholars have discussed the moderators mood, self-esteem (Wiersema et al. 2012), and situational and task characteristics (Scholl 2004; Sweeny et al. 2010).
Development of a Theoretical Model Deriving a Conceptualization of Information Avoidance Behavior A coherent conceptualization of the information avoidance construct is a prerequisite for explaining and predicting information avoidance behavior. The literature review has revealed that no such conceptualization yet exists. To answer research question 1, this paper proposes a conceptualization that is based on idealized information behavior processes derived from the literature on human information behavior (Dervin 1998; Nahl and Bilal 2007; Savolainen 1993; 2007; Wilson 1999; 2000). It subdivides information processing into the abstract phases of exposure, absorption, and use. Exposure refers to either actively seeking contact with a piece of information or allowing contact when passively exposed to it, for example, paying attention to a link “read more” and clicking it. Absorption refers to the act of actually consuming and processing the information, for example, through reading or listening. Use refers to the transformative process of shaping decisions using the information. Because information avoidance can occur during each phase, the construct is split into three sub-constructs: exposure avoidance, absorption avoidance, and use avoidance. Exposure avoidance refers to either actively or passively preventing contact with information (Fischer et al. 2005). Active selective exposure refers to avoiding searching, and passive selective exposure refers to avoiding learning that information (in principle) exists. Absorption avoidance refers to information being processed with a lower intensity or not at all. An example is purposeful superficial reading or skimming (Donohew et al. 1972; Maier and Richter 2013). Use avoidance refers to preventing the transformative process of shaping decisions using the information (Choo et al. 2008; Dervin 1998; Greenwald 1997; Menon and Varadarajan 1992). An example is the avoidance of drawing inferences from obtained information (Greenberg et al. 2003). Building on this integration of constructs and the definition by Sweeny et al. (2010) and by focusing on decision-relevant information (Narayan et al. 2011; Scholl 2004; Shanteau 1992), information avoidance is defined as limiting or terminating the attention given to cues that indicate that decision-relevant information is available, or limiting or terminating the search for decision-relevant information (exposure avoidance), limiting or terminating the absorption of decisionrelevant information (absorption avoidance), and limiting or terminating the use of decision-relevant information (use avoidance). Table 1 depicts how the scattered literature on separate subtypes of information avoidance are integrated into the idealized search process and the three sub-constructs.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
3
Model of Defensive Information Avoidance
Table 1: Phenomena Evident in the Literature “Confirmatory Search”
“Selective Exposure”
“Superficial processing”
“Information non-use”
Bhatia 2014; Fischer et al. 2011; McIntosh et al. 2001; Phillips et al. 2008; Shepherd et al. 2012; Swann and Giuliano 1987
Case et al. 2005; Donohew et al. 1972; Howell and Shepperd 2012; Maier and Richter 2013; Melnyk 2009; Miles et al. 2008; Mills and Jellison 1968
Beevers and Scott 2001; Bodenhausen and Wyer 1987; Guo et al. 2005; Ingram 1984; Johnson 2005; Osvaldo De Sordi et al. 2014
Choo et al. 2008; Greenwald 1997; Menon and Varadarajan 1992; Narayan et al. 2011; Shanteau 1992; Wang and Domas 1999; Wang and Soergel 1998
Integrated into idealized process of information behavior: Exposure Avoidance à
Absorption Avoidance à
Use Avoidance
Limiting or terminating the search for decision-relevant information
Limiting or terminating the absorption of decision-relevant information
Limiting or terminating the use of decision-relevant information
Understanding the Role of Approach and Defense Motivations in Information Avoidance Behavior This paper is concerned with defensive information avoidance. For explaining avoidance, it is necessary to understand what causes information approach. Based on the theory of motivated reasoning (Kunda 1990), this paper proposes that two simultaneous and competing motivational forces are prevalent when individuals encounter information. Approach motivation (Kunda 1990; Munro and Stansbury 2009) describes the desire to steer mental resources towards information exposure, absorption, and use. This is based on the information’s perceived usefulness for solving a task. Perceived usefulness of information is theoretically linked to its topicality and quality (Richard et al. 1996; Wang and Soergel 1998). Information is topical if it relates to the concepts and rules relevant to solving the task (BoYcE 1982; Hjørland 2001). Information quality is determined by the absence of the intrinsic quality deficits of ambiguity, inconsistency, vagueness, imprecision, and redundancy (Boell and Cecez-Kecmanovic 2010; Lee et al. 2002; McKinney and Yoos 2010; Stvilia et al. 2007). Information that is seen as potentially useful represents an opportunity and motivates its absorption, exposure, and use (White et al. 2003). The anticipation of positive affect resulting from anticipated information usefulness causes approach motivation (Richard et al. 1996). It follows from the theory of planned behavior that positive outcome expectancies lead to higher use intentions (Madden et al. 1992). In line with the theory of planned behavior, it is predicted that positive outcome expectancies lead to higher use intentions and to actual use (Madden et al. 1992; Menon and Varadarajan 1992) Defense motivation (Kunda 1990; Munro and Stansbury 2009; Sherman and Cohen 2002; 2006) describes the desire to steer mental resources away from information exposure, absorption, and use. This is based on the information’s capacity to pose a threat, where threat does not refer to a physical threat, but to the anticipation of a negative affect arising from the information’s pragmatic implications (Sherman and Cohen 2002). Threat is a future-oriented cognitive-affective state (Gray and McNaughton 2003) and primarily determined by the anticipation of events. Most psychological threats relate to the self and selfperception in relation to the environment (Das and Fennis 2008; Festinger 1962; Proulx et al. 2012). Encountering information that mismatches what is expected and believed challenges one’s perception of the self and the environment (Proulx et al. 2012). Researchers studied various manifestations of what
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
4
Model of Defensive Information Avoidance
specifically can mismatch: new information can mismatch, for example, with prior beliefs, social status perception, or past decisions (Bonniot-Cabanac et al. 2012; Fontanari et al. 2011). All these manifestations represent instances of information incongruence. While information quality refers to intrinsic information characteristics, information congruency refers to the pragmatic compatibility between units of information (Proulx et al. 2012; Taber and Lodge 2006). Accordingly, incongruence refers to the pragmatic disagreement and incompatibility between units of information. The consequence of incongruence is dissonance, and dissonance stands in relationship to defense motivations (Cooper and Worchel 1970; Festinger 1962; Harmon-Jones and Harmon-Jones 2002; Jones and Amodio 2009; Zajonc 1960). However, past research is inconclusive concerning the actual behavioral results of this defense motivation. It reports both approach as well as avoidance behaviors, and posits that the assumption of defense motivations always leading to avoidance reactions (Lowin 1967) is not true (Cotton and Hieser 1980; Mills 1965; Sears and Freedman 1967). Specifically, there is evidence that incongruent information receives increased initial attention (Jang 2014).
Research Model and Hypotheses The following section derives a theoretical explanation for the relationships between information incongruence, threat, and defense motivations in situations of information encountering. It explains why defense motivations cause increased initial information exposure, but subsequently decreased information absorption and use. The model is depicted in Figure 1.
Figure 1. Research Model
Based on extant theory, this paper posits that the need to perceive and assess the threat causes a higher initial exposure, but that the desire to reduce dissonance and to circumvent the unpleasant information reduces the intensity of actual information absorption and use. The following section articulates and explains the hypotheses of the model. Table 2 provides the definitions of all theoretical constructs that are part of the model.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
5
Model of Defensive Information Avoidance
Table 2. Construct Definitions
Mediators
DVs
Construct
Definition
Based on
Information Avoidance
Limiting or terminating the exposure to, absorption of, or use of decision-relevant information
Sweeny et al. 2010; 2012
- Exposure
Searching for or opening the information
Rieh 2002
- Absorption
Taking-in the information through one’s senses – e.g. through reading.
Dervin 1998; Wilson 2000
- Use
The transformative act of shaping decision through Information (cues)
Choo et al. 2008; Menon and Varadarajan 1992; Shanteau 1992; Wang and Domas 1999
Anticipated information threat
Expectation that the information has the potential to cause negative affect
Gray and McNaughton 2003; Richard et al. 1996
Defense motivation
Motivational state of preparing cognitive and affective resources
Kunda 1990; Munro and Stansbury 2009; Masterson and Crawford 1982
The information’s pragmatic disagreement and incompatibility with another piece of information
Meffert et al. 2006; Taber and Lodge 2006
IVs
Information - Incongruence
New information is perceived as incongruent if it stands in pragmatic disagreement to prior beliefs or knowledge (Taber and Lodge 2006). Pragmatism refers to drawing meaning inferences from the information (Harris and Monaco 1978). Thus, incongruence implies the presence of at least two discrepant cognitions (Jones and Amodio 2009), namely the existing knowledge and the meaning inferred from the new (incongruent) information. Holding discrepant cognitions is linked to perceiving dissonance (Fischer and Greitemeyer 2010; Fischer, Kastenmüller, et al. 2011). If the challenged beliefs and knowledge are of self-relevance, the result is the perception of threat (Proulx et al. 2012; Sherman and Cohen 2002). Accordingly, it is predicted that high incongruence leads to high threat perception: H1: The higher the information incongruence to existing beliefs and knowledge, the higher the perceived threat by the information. Perceiving threat causes complex cognitive and affective processes (Bawden and Robinson 2008; Cheikes et al. 2004; Kuhlmann 1983; Scherer 2000). Psychologically, the perception of a threat is linked to the activation of defense motivations. Defense motivations refer to the preparation of cognitive affective resources in order to cope with the stimulus (Masterson and Crawford 1982). Assessing available resources is a prerequisite for comparing available resources to required recourses as predicted by coping theory during primary appraisal (Folkman 1984). Accordingly, it is hypothesized that: H2: The higher the perceived information threat, the higher the defense motivation. Being exposed to incongruent and thus threatening information is a stressful event. Coping theory posits that contact with a stressful event causes a cognitive appraisal process (Folkman and Lazarus 1988; Krohne 2001; Lazarus 1993; Schwarzer and Schwarzer 1996; Weinert et al. 2013). This process aims at assessing the stressor and determining coping resources for mastering or reducing the demands created by the stressor. This requires that attention be placed on the stimulus. Accordingly, individuals will place initial attention (Meffert et al. 2006) on the stimulus that “captures the interest” (Meffert et al. 2006, p. 28) as part of an initial action orientation (Jones and Amodio 2009). This is also supported from an evolutionary standpoint and by the orienting response (Bernstein 1979): the initial approach to a threat allows the selection of appropriate actions (Roth and Cohen 1986). Accordingly, it is hypothesized: H3: The higher the defense motivation, the more intense the exposure to the information.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
6
Model of Defensive Information Avoidance
Several studies have linked defense motivations to absorption and use avoidance (Brannon et al. 2007; Case et al. 2005; Fischer and Greitemeyer 2010; Knobloch-Westerwick and Jingbo Meng 2009; Krohne and Hock 2011). This is explained by the desire to reduce dissonance and to resolve the associated negative affect. Stopping to absorb the information or absorbing the information only superficially (e.g. by skimming) allows increasing the distance between oneself and the information. Similarly, not using the information and not integrating it into one’s mental model allows increasing the distance between oneself and the information (Diamantopoulos and Souchon 1999; Garrett 2009). In line with this, it is hypothesized that: H4: The higher the defense motivation, the less intense the absorption of the information. H5: The higher the defense motivation, the less intense the use of the information. In summary, the research model predicts that information incongruence causes dissonance and the perception of threat. This threat causes a defense motivation that has complex effects on the actual outcome behavior. The more incongruent the information a user encounters, the higher the willingness to seek exposure, but the less intense the information absorption and the lower the actual information use.
Research Design This paper proposes adopting an experimental research design (Benbasat and Schroeder 1977; Benbasat and Taylor 1982) for testing the research model. The range of research methods within the experimental methodology is vast. Recent advances in NeuroIS have introduced methods that allow researchers to elicit neuro- and psychophysiological data for providing empirical evidence (Loos et al. 2010; Riedl et al. 2012). For reducing common method bias, this paper seeks to triangulate several measurement instruments (Burton-Jones 2009; Burton-Jones and Straub 2004). The following section outlines the planned experiments, the construct operationalizations, and the method choices.
Tasks and Stimuli There are two paradigms in experimental psychology for studying the effects of incongruence, dissonance, and threat, and they differ in how they manipulate threat. The first paradigm creates threat by presenting a choice scenario and requires participants (Ps) to make a preliminary decision. Additional information is presented after the decision. Depending on the choice, some information will be perceived as congruent and some as incongruent. The second paradigm makes use of Ps predispositions concerning a topic; researchers frequently select polarizing topics, such as abortion or gun laws. This paper seeks to test the hypothesized research model in two experiments. The first experiment represents the first paradigm and is an extension of the Mr. Miller task scenario from psychology (Fischer et al. 2008; Niedernhuber et al. 2014). Ps are assigned the role of HR managers who have to make a decision on the termination or extension of the contract of the employee Mr. Miller. After Ps made a preliminary decision about Mr. Miller’s future, several opinion pieces about Mr. Miller’s performance are presented. These texts are presented as a list of excerpts and speak either in favor of or against Mr. Miller. They are perceived as either congruent or incongruent – depending on the subject’s preliminary decision. Ps can request full texts by selecting individual excerpts (exposure) and read the documents (absorption). In the last stage of the experiment, Ps make a final decision concerning Mr. Miller (use). The paper’s second experiment represents the second paradigm. This paradigm makes use of Ps existing attitudes. A pretest (n=50) identified nuclear energy as a polarizing topic among the target (student) population. Eight pronuclear and eight antinuclear texts of similar complexity and length have been created and validated in another pretest (n=80). Depending on Ps’ existing attitudes (for or against nuclear power), half of the texts will be perceived as congruent and the other half incongruent. The experimental task then follows the Mr. Miller scenario described above.
Measurements This paper proposes combining neurophysiological measures with self-rating scales and observations. Because participants may perform poorly in reporting perceived levels of threat accurately, the introduction of neurophysiological measures is promising. The following introduces the neurophysiological measurement of threat, information exposure, and information absorption. Threat is
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
7
Model of Defensive Information Avoidance
similar to stress in causing a (bodily) physiological activation. Threat is not an emotion, however it cooccurs with emotions such as anxiety, doubt, frustration, and anger (Tomaka et al. 1993). It is possible to measure threat by observing the physiological activation itself or by observing the negative emotions that correlate with threat. This paper combines both approaches by using electrodermal activity (EDA) and pulse plethysmography (PPG) for measuring physiological arousal (Adam et al. 2011; Carbonnell et al. 2006; Cooper and Croyle 2007), and using facial electromyography (fEMG) for detecting expressive correlates of negative emotion. EDA measures changes in the electrical properties of the skin that reflect activation of the autonomous nervous system. Electrodes are attached to participants non-dominant hand (Christie 1981). PPG measures blood flow and heart rate using infrared light (Carter et al. 2005). The PPG sensor is places on participants’ non-dominant index finger. Facial EMG measures the electrical activation of facial muscles. Emotional perceptions are reflected in facial muscle activation (van Boxtel 2009). These can be minimal, unconscious, and invisible for the human eye. Relevant for measuring negative emotions is the corrugator supercilii (“frowning”) muscle that is responsible for eye brow movement (van Boxtel 2009). Eye-tracking allows recording eye-movements (saccades) and fixations, and thus making inferences about attention and information processing (Cyr et al. 2009; Granka et al. 2008; Hermens and Walker 2012). Previous work used eye-tracking for measuring intra-individual differences in reading behavior and reading intensity (Holsanova 2006; Rayner 2009; Rayner et al. 2006). This paper uses eye-tracking for measuring information exposure and absorption. This paper uses scales for measuring anticipated information threat (based on MacLeod and Hagan (1992) and Speilberger and Vagg (1984)), defense motivation (based on Folkman (2013), Miller (1987) and Vitaliano et al. (1985)), and information use (based on (Diamantopoulos and Souchon 1999; Maier and Richter 2013)). All items are 7-point Likerttype scales anchored at agree and disagree.
Discussion and Conclusion This research-in-progress seeks to contribute in four ways: first, it provides a unified conceptualization of information avoidance behavior. Providing this first conceptualization draws attention to the phenomenon of information avoidance, and allows future research to approach the phenomenon in a structured way. Second, it offers a theoretical model for explaining yet unexplained IS use phenomena, where decision-relevant but incongruent information – paradoxically – leads to a higher exposure but a decreased absorption and use. Third, it proposes a series of neurophysiological measures that rely on fEMG, PPG, EDA, and eye-tracking. Conducting the full experiment will provide further insights into their validity and reliability, and could potentially manifest a methodological contribution. Fourth, this paper presents two experimental paradigms derived from experimental psychology for studying information avoidance behavior. IS researchers interested in information avoidance – or information pathologies in general – are invited to build on these paradigms when conducting their experiments. The paper contributes to practice, by explaining how users that avoid decision-relevant information are less likely to make optimal decisions. Based on the model, practitioners can understand that defense motivations cause information avoidance and that interventions aiming at overcoming information avoidance would need to address this defensive reaction first.
Limitations Because of the research-in-progress status, several limitations exist. The current model (Figure 1) looks at situations of information encountering, which is a form of passive information exposure (see active versus passive exposure). It thus describes situations where a person “stumbles” over e.g. a document and decides to open it (exposure), read the content (absorption), and draw inferences from its information (use). This passiveness is also evident in the two described experimental paradigms. Hypothesis 3 thus reflects the willingness for exposure after such passive encounters. Future versions of the model may be extended to account for situations of active exposure – such as information search. This research-inprogress discussed a series of moderators. However, in order to concentrate on the core of the threatbased explanations of information avoidance, these moderators are not part of the depicted model (Figure 1). Future versions of the model could be extended to include these moderators.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
8
Model of Defensive Information Avoidance
References Adam, M. T. P., Gamer, M., Krämer, J., and Weinhardt, C. 2011. “Measuring Emotions in Electronic Markets,” in Proceedings of the International Conference on Information Systems (ICIS), pp. 1–19. Bawden, D., and Robinson, L. 2008. “The dark side of information: overload, anxiety and other paradoxes and pathologies,” Journal of information science (35:2), SAGE Publications, pp. 180–191. Beevers, C. G., and Scott, W. D. 2001. “Ignorance may be bliss, but thought suppression promotes superficial cognitive processing,” Journal of Research in Personality (35:4), pp. 546–553. Benbasat, I., and Schroeder, R. G. 1977. “An Experimental Investigation of Some MIS Design Variables,” MIS Quarterly (1:1), Management Information Systems Research Center, University of Minnesota, pp. 37–49. Benbasat, I., and Taylor, R. N. 1982. “Behavioral aspects of information processing for the design of management information systems,” IEEE Transactions on Systems, Man and Cybernetics (12:4), pp. 439–450. Bernstein, A. S. 1979. “The Orienting Response as Novelty and Significance Detector: Reply to O'Gorman,” Psychophysiology (16:3), pp. 263–273. Bhatia, S. 2014. “Confirmatory search and asymmetric dominance,” Journal of Behavioral Decision Making (27:5), pp. 468–476. Bodenhausen, G. V., and Wyer, R. S., Jr. 1987. “Social cognition and social reality: Information acquisition and use in the laboratory and the real world,” Social Information Processing and Survey Methodology, pp. 6-41. Boell, S., and Cecez-Kecmanovic, D. 2010. “Attributes of information,” Presented at the Americas Conference on Information Systems, pp. 1–10. Bonniot-Cabanac, M.-C., Cabanac, M., Fontanari, J. F., and Perlovsky, L. I. 2012. “Instrumentalizing Cognitive Dissonance Emotions,” Psychology (3:12), pp. 1018–1026. BoYcE, B. 1982. “Beyond topicality: A two stage view of relevance and the retrieval process,” Information Processing & Management (18:3), pp. 105–109 Brannon, L. A., Tagler, M. J., and Eagly, A. H. 2007. “The moderating role of attitude strength in selective exposure to information,” Journal of Experimental Social Psychology (43:4), pp. 611–617. Brouwers, M. C., and Sorrentino, R. M. 1993. “Uncertainty orientation and protection motivation theory: The role of individual differences in health compliance,” Journal of Personality and Social Psychology (65:1), p. 102–112. Browne, G. J., Pitts, M. G., and Wetherbe, J. C. 2007. “Cognitive Stopping Rules for Terminating Information Search in Online Tasks,” MIS Quarterly (31:1), Management Information Systems Research Center, University of Minnesota, pp. 89–104. Burton-Jones, A. 2009. “Minimizing Method Bias through Programmatic Research,” MIS Quarterly (33:3), Management Information Systems Research Center, University of Minnesota, pp. 445–471. Burton-Jones, A., and Grange, C. 2013. “From Use to Effective Use: A Representation Theory Perspective,” Information Systems Research (24:3), pp. 632–658. Burton-Jones, A., and Straub, D. W. 2004. “Minimizing method variance in measures of system usage,” in Proceedings of the Southern Conference for Information Systems, pp. 336–342. Carbonnell, L., Vidal, F., Sequeira, H., and Caverni, J.-P. 2006. “A reasoning bias revealed by electrodermal activity,” Psychophysiology (43:4), Blackwell Publishing Inc, pp. 387–393. Carter, J. R., Kupiers, N. T., and Ray, C. A. 2005. “Neurovascular responses to mental stress,” The Journal of Physiology (564:1), pp. 321–327. Case, D. O., Andrews, J. E., Johnson, J. D., and Allard, S. L. 2005. “Avoiding versus seeking: the
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
9
Model of Defensive Information Avoidance
relationship of information seeking to avoidance, blunting, coping, dissonance, and related concepts,” Journal of the Medical Library Association (93:3), p. 353. Cheikes, B. A., Brown, M. J., Lehner, P. E., and Adelman, L. 2004. “Confirmation bias in complex analyses,” MITRE Center for Integrated Intelligence Systems. Choo, C. W., Bergeron, P., Detlor, B., and Heaton, L. 2008. “Information culture and information use: An exploratory study of three organizations,” Journal of the American Society for Information Science and Technology (59:5), pp. 792–804. Christie, M. J. 1981. “Electrodermal activity in the 1980s: a review.,” Journal of the Royal Society of Medicine (74:8), p. 616. Connelly, C. E., Zweig, D., Webster, J., and Trougakos, J. P. 2012. “Knowledge hiding in organizations,” Journal of Organizational Behavior (33:1), pp. 64–88. Cooper, J., and Croyle, T. R. 2007. “Dissonance Arousal: Physiological Evidence,” Journal of Personality and Social Psychology (45:4), pp. 782–791. Cooper, J., and Worchel, S. 1970. “Role of undesired consequences in arousing cognitive dissonance,” Journal of Personality and Social Psychology (16:2), p. 199–206. Cotton, J. L., and Hieser, R. A. 1980. “Selective exposure to information and cognitive dissonance,” Journal of Research in Personality (14:4), pp. 518–527. Cyr, D., Head, M., Larios, H., and Pan, B. 2009. “Exploring Human Images in Website Design: A MultiMethod Approach,” MIS Quarterly (33:3), Management Information Systems Research Center, University of Minnesota, pp. 539–566. Das, E., and Fennis, B. M. 2008. “In the mood to face the facts: When a positive mood promotes systematic processing of self-threatening information,” Motivation and Emotion (32:3), pp. 221– 230. Dervin, B. 1998. “Sense-making theory and practice: an overview of user interests in knowledge seeking and use,” Journal of knowledge management (2:2), pp. 36–46. Diamantopoulos, A., and Souchon, A. L. 1999. “Measuring export information use: scale development and validation,” Journal of Business Research (46:1), pp. 1–14. Donohew, L., Parker, J. M., and McDermott, V. 1972. “Psychophysiological measurement of information selection: Two studies,” Journal of Communication (22:1), pp. 54–63. Festinger, L. 1962. A Theory of cognitive dissonance. Tavistock Publications, London. Fischer, P., and Greitemeyer, T. 2010. “A New Look at Selective-Exposure Effects: An Integrative Model,” Current Directions in Psychological Science (19:6), pp. 384–389. Fischer, P., Fischer, J. K., Aydin, N., and Frey, D. 2010. “Physically Attractive Social Information Sources Lead to Increased Selective Exposure to Information,” Basic and Applied Social Psychology (32:4), pp. 340–347. Fischer, P., Greitemeyer, T., and Frey, D. 2008. “Self-regulation and selective exposure: The impact of depleted self-regulation resources on confirmatory information processing,” Journal of Personality and Social Psychology (94:3), pp. 382–395. Fischer, P., Jonas, E., Frey, D., and Schulz-Hardt, S. 2005. “Selective exposure to information: the impact of information limits,” European Journal of Social Psychology (35:4), Ltd., pp. 469–492. Fischer, P., Lea, S., Kastenmüller, A., Greitemeyer, T., Fischer, J., and Frey, D. 2011. “The process of selective exposure: Why confirmatory information search weakens over time,” Organizational Behavior and Human Decision Processes (114:1), pp. 37–48. Fischer, P., Schulz-Hardt, S., and Frey, D. 2008. “Selective exposure and information quantity: How different information quantities moderate decision makers' preference for consistent and inconsistent information.,” Journal of Personality and Social Psychology (94:2), pp. 231–244.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 10
Model of Defensive Information Avoidance
Floridi, L. 2009. “Philosophical Conceptions of Information,” in Formal theories of information (Vol. 5363), Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 13–53. Folkman, S. 1984. “Personal control and stress and coping processes: A theoretical analysis,” Journal of Personality and Social Psychology (46:4), pp. 839–852. Folkman, S. 2013. “Ways of Coping Checklist (WCCL),” in Encyclopedia of Behavioral Medicine, Springer, pp. 2041–2042. Folkman, S., and Lazarus, R. S. 1988. “The relationship between coping and emotion: Implications for theory and research,” Social Science & Medicine (26:3), pp. 309–317. Fontanari, J. F., Perlovsky, L. I., Bonniot-Cabanac, M. C., and Cabanac, M. 2011. “Emotions of cognitive dissonance,” Presented at the Neural Networks (IJCNN), The 2011 International Joint Conference on, IEEE, pp. 95–102. Garrett, R. K. 2009. “Politically Motivated Reinforcement Seeking: Reframing the Selective Exposure Debate,” Journal of Communication (59:4), pp. 676–699. Garrett, R. K. 2013. “Selective Exposure: New Methods and New Directions,” Communication Methods and Measures (7:3-4), pp. 247–256. Granka, L., Feusner, M., and Lorigo, L. 2008. “Eyetracking in Online Search,” Passive Eye Monitoring, pp. 283–304. Gray, J. A., and McNaughton, N. 2003. The neuropsychology of anxiety: An enquiry into the function of the septo-hippocampal system, Oxford University press. Greenberg, J., Martens, A., Jonas, E., Eisenstadt, D., Pyszczynski, T., and Solomon, S. 2003. “Psychological Defense in Anticipation of Anxiety Eliminating the Potential for Anxiety Eliminates the Effect of Mortality Salience on Worldview Defense,” Psychological Science (14:5), pp. 516–519. Greenwald, A. G. 1997. “Self-knowledge and self-deception: Further consideration,” in The Mythomanias The Nature of Deception and Self-Deception, M. S. Myslobodsky (ed.), Psychology Press. Guo, S. Z., Cheong, A. W. H., and Shen, C. F. 2005. “Depth of reasoning and information processing: a predictive model of SARS behavior,” Asian Journal of Communication (15:3), pp. 274–288. Harmon-Jones, E., and Harmon-Jones, C. 2002. “Testing the Action-Based Model of Cognitive Dissonance: The Effect of Action Orientation on Postdecisional Attitudes,” Personality and Social Psychology Bulletin (28:6), pp. 711–723. Harris, R. J., and Monaco, G. E. 1978. “Psychology of pragmatic implication: Information processing between the lines,” Journal of Experimental Psychology: General (107:1), pp. 1–22. Hart, W., Adams, J. M., Burton, K. A., and Shreves, W. 2012. “Shaping reality vs. hiding from reality: Reconsidering the effects of trait need for closure on information search,” Journal of Research in Personality (46), pp. 489–496. Hermens, F., and Walker, R. 2012. “Do you look where I look? Attention shifts and response preparation following dynamic social cues,” Journal of Eye Movement Research (5:5), pp. 1–11. Hjørland, B. 2001. “Towards a theory of aboutness, subject, topicality, theme, domain, field, content and relevance,” JASIS (52:9), pp. 774–778. Holsanova, J. 2006. “Entry points and reading paths on newspaper spreads: comparing a semiotic analysis with eye-tracking measurements,” Visual Communication (5:1), pp. 65–93. Hong, T. 2014. “Examining the Role of Exposure to Incongruent Messages on the Effect of Message Framing in an Internet Health Search,” Communication Research (41:2), pp. 159–179. Howell, J. L., and Shepperd, J. A. 2012. “Reducing Information Avoidance Through Affirmation,” Psychological Science (23:2), pp. 141–145. Huang, M.-H. 2000. “Information load: its relationship to online exploratory and shopping behavior,” International Journal of Information Management (20:5), pp. 337–347.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015
11
Model of Defensive Information Avoidance
Ingram, R. E. 1984. “Information processing and feedback: Effects of mood and information favorability on the cognitive processing of personally relevant information,” Cognitive Therapy and Research (8:4), pp. 371–385. Jacoby, J. 1984. “Perspectives on Information Overload,” Journal of Consumer Research (10:4), Journal of Consumer Research, pp. 432–435. Jang, S. M. 2014. “Seeking Congruency or Incongruency Online? Examining Selective Exposure to Four Controversial Science Issues,” Science Communication (36:2), pp. 143–167. Johnson, B. B. 2005. “Testing and Expanding a Model of Cognitive Processing of Risk Information,” Risk Analysis (25:3), pp. 631–650. Jonas, E., Schulz-Hardt, S., Frey, D., and Thelen, N. 2001. “Confirmation bias in sequential information search after preliminary decisions: An expansion of dissonance theoretical research on selective exposure to information,” Journal of Personality and Social Psychology (80:4), pp. 557–571. Jones, E. H., and Amodio, D. M. 2009. “Action-Based Model of Dissonance: A Review, Integration, and Expansion of Conceptions of Cognitive Conflict,” Advances in experimental social psychology (41), pp. 119–166. Kastenmüller, A., Jonas, E., Fischer, P., Frey, D., and Fischer, J. 2013. “Selective exposure among advisors: the impact of impression motivation,” Journal of Applied Social Psychology (43:1), pp. 138–146. Knobloch-Westerwick, S., and Jingbo Meng. 2009. “Looking the Other Way: Selective Exposure to Attitude-Consistent and Counterattitudinal Political Information,” Communication Research (36:3), pp. 426–448. Krohne, H. W. 2001. “Stress and coping theories,” In The international encyclopedia of the social and behavioral sciences, Elsevier, Amsterdam. Krohne, H. W., and Hock, M. 2011. “Anxiety, coping strategies, and the processing of threatening information: Investigations with cognitive-experimental paradigms,” Personality and individual differences (50:7), pp. 916–925. Kuhlmann, E. 1983. “On the economic analysis of the information-seeking behaviour of consumers,” Journal of Consumer Policy (6:2), pp. 231–237. Kunda, Z. 1990. “The case for motivated reasoning.,” Psychological bulletin (108:3), pp. 480–498. Lazarus, R. S. 1993. “Coping theory and research: past, present, and future,” Psychosomatic medicine (55:3), p. 234. Lee, Y. W., Strong, D. M., Kahn, B. K., and Wang, R. Y. 2002. “AIMQ: a methodology for information quality assessment,” Information & Management (40:2), pp. 133–146. Loos, P., Riedl, R., Müller-Putz, G. R., Brocke, J., Davis, F. D., Banker, R. D., and Léger, P.-M. 2010. “NeuroIS: Neuroscientific Approaches in the Investigation and Development of Information Systems,” Business & Information Systems Engineering (2:6), pp. 395–401. Lowin, A. 1967. “Approach and avoidance: alternate modes of selective exposure to information,” Journal of Personality and Social Psychology (6:1), pp. 1–9. MacLeod, C., and Hagan, R. 1992. “Individual differences in the selective processing of threatening information, and emotional responses to a stressful life event,” Behaviour research and therapy (30:2), pp. 151–161. Madden, T. J., Ellen, P. S., and Ajzen, I. 1992. “A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action,” Personality and Social Psychology Bulletin (18:1), pp. 3–9 . Maier, J., and Richter, T. 2013. “Text Belief Consistency Effects in the Comprehension of Multiple Texts With Conflicting Information,” Cognition and Instruction (31:2), pp. 151–175. Malhotra, N. K., Jain, A. K., and Lagakos, S. W. 1982. “The information overload controversy: An
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 12
Model of Defensive Information Avoidance
alternative viewpoint,” The Journal of Marketing (46:2), pp. 27–37. Masterson, F. A., and Crawford, M. 1982. “The defense motivation system: A theory of avoidance behavior,” Behavioral and Brain Sciences (5:04), pp. 661–675. McIntosh, W. D., Martin, L. L., and Jones, J. B., III. 2001. “Goal orientations and the search for confirmatory affect,” The Journal of psychology (135:1), pp. 5–16. McKinney, E. H., Jr, and Yoos, C. J., II. 2010. “Information about information: A taxonomy of views,” MIS Quarterly (34:2), Society for Information Management and The Management Information Systems Research Center, pp. 329–344. Meffert, M. F., Chung, S., Joiner, A. J., Waks, L., and Garst, J. 2006. “The Effects of Negativity and Motivated Information Processing During a Political Campaign,” Journal of Communication (56:1), pp. 27–51. Melnyk, D. 2009. “When We Do Not Want to Know: The Information Avoidance Model,” University of Florida. Menon, A., and Varadarajan, P. R. 1992. “A Model of Marketing Knowledge Use within Firms,” Journal of Marketing (56:4), pp. 53–71. Miles, A., Voorwinden, S., Chapman, S., and Wardle, J. 2008. “Psychologic Predictors of Cancer Information Avoidance among Older Adults: The Role of Cancer Fear and Fatalism,” Cancer Epidemiology Biomarkers & Prevention (17:8), pp. 1872–1879. Miller, S. M. 1987. “Monitoring and blunting: Validation of a questionnaire to assess styles of information seeking under threat,” Journal of Personality and Social Psychology (52:2), pp. 345–353. Mills, J. 1965. “Avoidance of dissonant information,” Journal of Personality and Social Psychology (2:4), p. 589. Mills, J., and Jellison, J. M. 1968. “Avoidance of discrepant information prior to commitment,” Journal of Personality and Social Psychology (8:1), pp. 59–62. Munro, G. D., and Stansbury, J. A. 2009. “The Dark Side of Self-Affirmation: Confirmation Bias and Illusory Correlation in Response to Threatening Information,” Personality and Social Psychology Bulletin (35:9), pp. 1143–1153. Nahl, D., and Bilal, D. 2007. Information and emotion: The emergent affective paradigm in information behavior research and theory, Medford Township: Information Today. Narayan, B., Case, D. O., and Edwards, S. L. 2011. “The role of information avoidance in everyday-life information behaviors,” (Vol. 74), in Proceedings of the American Society for Information Science and Technology, pp. 1–7. Niedernhuber, J., Kastenmueller, A., and Fischer, P. 2014. “Chaos and Decision Making: Contextual Disorder Reduces Confirmatory Information Processing,” Basic and Applied Social Psychology (36:3), pp. 199–208. Neben, T., Hemmer, E., and Heinzl A. 2013. "Overcoming Information Avoidance," in Proceedings of Gmunden Retreat on NeuroIS (Abstract), pp. 1-3. Osvaldo De Sordi, J., Meireles, M., and Carvalho de Azevedo, M. 2014. “Information selection by managers: priorities and values attributed to the dimensions of information,” Online Information Review (38:5), pp. 661–679. Pavlou, P. A., Dimoka, A., and Housel, T. J. 2008. “Effective Use of Collaborative IT Tools: Nature, Antecedents, and Consequences,” in Proceedings of HICSS, pp. 40–40. Phillips, J. M., Urbany, J. E., and Reynolds, T. J. 2008. “Confirmation and the Effects of Valenced Political Advertising: A Field Experiment,” Journal of Consumer Research (34:6), pp. 794–806. Poulsen, A. U., and Roos, M. W. 2010. “Do people make strategic commitments? Experimental evidence on strategic information avoidance,” Experimental Economics (13:2), pp. 206–225.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 13
Model of Defensive Information Avoidance
Proulx, T., Inzlicht, M., and Harmon-Jones, E. 2012. “Understanding all inconsistency compensation as a palliative response to violated expectations,” Trends in cognitive sciences (16:5), pp. 285–291. Rayner, K. 2009. “Eye movements and attention in reading, scene perception, and visual search,” The Quarterly Journal of Experimental Psychology (62:8), pp. 1457–1506. Rayner, K., Chace, K. H., Slattery, T. J., and Ashby, J. 2006. “Eye movements as reflections of comprehension processes in reading,” Scientific Studies of Reading (10:3), pp. 241–255. Richard, R., Van der Pligt, J., and De Vries, N. 1996. “Anticipated affect and behavioral choice,” Basic and Applied Social Psychology (18:2), pp. 111–129. Riedl, R., Kindermann, H., Auinger, A., and Javor, A. 2012. “Technostress from a Neurobiological Perspective,” Business & Information Systems Engineering (4:2), pp. 61–69. Roth, S., and Cohen, L. J. 1986. “Approach, avoidance, and coping with stress.,” American Psychologist (41:7), pp. 813–819. Savolainen, R. 1993. “The sense-making theory: Reviewing the interests of a user-centered approach to information seeking and use,” Information Processing & Management (29:1), pp. 13–28. Savolainen, R. 2007. “Filtering and withdrawing: strategies for coping with information overload in everyday contexts,” Journal of information science (33:5), pp. 611–621. Scherer, A. M., Windschitl, P. D., and Smith, A. R. 2013. “Hope to be right: Biased information seeking following arbitrary and informed predictions,” Journal of Experimental Social Psychology (49:1), pp. 106–112. Scherer, K. R. 2000. “Psychological models of emotion,” The neuropsychology of emotion (137), p. 162. Scholl, W. 2004. Innovation und Information: Wie in Unternehmen neues Wissen produziert wird, Hogrefe Verlag (German). Schwarzer, R., and Schwarzer, C. 1996. “A critical survey of coping instruments,” Handbook of coping: Theory, Research, Applications, pp. 107–132. Sears, D. O., and Freedman, J. L. 1967. “Selective exposure to information: A critical review,” Public Opinion Quarterly (31:2), pp. 194–213. Selke, A. 2006. Informationsmanagement in schnell wachsenden Unternehmen (Vol. 4), Kassel: Kassel University Press GmbH (German). Sexton, K. A., and Dugas, M. J. 2008. “The Cognitive Avoidance Questionnaire: Validation of the English translation,” Journal of Anxiety Disorders (22:3), pp. 355–370. Shanteau, J. 1992. “How much information does an expert use? Is it relevant?” Acta Psychologica (81:1), pp. 75–86. Shepherd, D. A., Haynie, J. M., and McMullen, J. S. 2012. “Confirmatory search as a useful heuristic? testing the veracity of entrepreneurial conjectures,” Journal of Business Venturing (27:6), pp. 637– 651. Sherman, D. K., and Cohen, G. L. 2002. “Accepting Threatening Information: Self-Affirmation and the Reduction of Defensive Biases,” Current Directions in Psychological Science (11:4), pp. 119–123. Sherman, D. K., and Cohen, G. L. 2006. “The psychology of self-defense: Self-affirmation theory,” Advances in experimental social psychology (38), pp. 183–242. Smith, C. A., and Lazarus, R. S. 1993. “Appraisal components, core relational themes, and the emotions,” Cognition & Emotion (7:3-4), pp. 233–269. Sorrentino, R. M., Bobocel, D. R., Gitta, M. Z., Olson, J. M., and Hewitt, E. C. 1988. “Uncertainty orientation and persuasion: Individual differences in the effects of personal relevance on social judgments,” Journal of Personality and Social Psychology (55:3), p. 357. Sorrentino, R. M., Holmes, J. G., Hanna, S. E., and Sharp, A. 1995. “Uncertainty orientation and trust in
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 14
Model of Defensive Information Avoidance
close relationships: Individual differences in cognitive styles,” Journal of Personality and Social Psychology (68:2), p. 314. Speilberger, C. D., and Vagg, P. R. 1984. “Psychometric properties of the STAI: a reply to Ramanaiah, Franzen, and Schill,” Journal of Personality Assessment (48:1), pp. 95–97. Stvilia, B., Gasser, L., Twidale, M. B., and Smith, L. C. 2007. “A framework for information quality assessment,” Journal of the American Society for Information Science and Technology (58:12), pp. 1720–1733. Swann, W. B., Jr, and Giuliano, T. 1987. “Confirmatory search strategies in social interaction: How, when, why, and with what consequences,” Journal of Social and Clinical Psychology (5:4), pp. 511–524. Sweeny, K., Melnyk, D., Miller, W., and Shepperd, J. A. 2010. “Information avoidance: Who, what, when, and why.,” Review of General Psychology (14:4), pp. 340–353. Sweeny, K., and Miller, W. 2012. “Predictors of Information Avoidance: When Does Ignorance Seem Most Blissful?,” Self and Identity (11:2), pp. 185–201. Taber, C. S., and Lodge, M. 2006. “Motivated Skepticism in the Evaluation of Political Beliefs,” American Journal of Political Science (50:3), pp. 755–769. Todd, R. J. 1999. “Back to our beginnings: Information utilization, Bertram Brookes and the fundamental equation of information science,” Information Processing & Management (35:6), pp. 851–870. Tomaka, J., Blascovich, J., Kelsey, R. M., and Leitten, C. L. 1993. “Subjective, physiological, and behavioral effects of threat and challenge appraisal,” Journal of Personality and Social Psychology (65:2), pp. 248–260. Tversky, A., and Kahneman, D. 1973. “Availability: A heuristic for judging frequency and probability,” Cognitive psychology (5:2), pp. 207-232. Valentino, N. A., Hutchings, V. L., Banks, A. J., and Davis, A. K. 2009. “'Selective Exposure in the Internet Age: Emotions as Triggers for Contemporary Political Information Seeking,” Political Psychology (30:4), pp. 591–613. van Boxtel, A. 2010. "Facial EMG as a tool for inferring affective states," in proceedings of Measuring Behavior, pp. 104–108. Van Zuuren, F. J., and Wolfs, H. M. 1991. “Styles of information seeking under threat: personal and situational aspects of monitoring and blunting,” Personality and individual differences (12:2), pp. 141–149. Vitaliano, P. P., Russo, J., Carr, J. E., and Maiuro, R. D. 1985. “The ways of coping checklist: Revision and psychometric properties,” Multivariate Behavioral Research (20), pp. 3–26. Wang, P., and Domas White, M. 1999. “A cognitive model of document use during a research project. Study II. Decisions at the reading and citing stages,” Journal of the American Society for Information Science (50:2), John Wiley & Sons, Inc., pp. 98–114. Wang, P., and Soergel, D. 1998. “A Cognitive Model of Document Use During a Research Project. Study I. Document Selection.,” JASIS (49:2), Wiley Subscription Services, Inc., A Wiley Company, pp. 115– 133. Weinert, C., Laumer, S., Maier, C., and Weitzel, T. 2013. “The Effect of Coping Mechanisms on Technology Induced Stress: Towards a Conceptual Model,” in Proceedings of the Americas Conference on Information Systems (AMCIS), pp. 1–10. White, J. C., Varadarajan, P. R., and Dacin, P. A. 2003. “Market situation interpretation and response: the role of cognitive style, organizational culture, and information use,” Journal of Marketing (67:3), pp. 63–79. Wiersema, D. V., van Harreveld, F., and van der Pligt, J. 2012. “Shut your eyes and think of something else: Self-esteem and avoidance when dealing with counter-attitudinal information,” Social Cognition (30:3), pp. 323–334.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 15
Model of Defensive Information Avoidance
Wilson, T. D. 1999. “Models in information behaviour research,” Journal of Documentation (55:3), pp. 249–270. Wilson, T. D. 2000. “Human information behavior,” Informing science (3:2), Informing Science Insitute, pp. 49–56. Witte, E., Joost, N., and Thimm, A. L. 1972. “Field Research on Complex Decision-Making Processes - The Phase Theorem,” International Studies of Management & Organization (2:2), pp. pp. 156–182. Zajonc, R. B. 1960. “The Concepts of Balance, Congruity, and Dissonance,” The Public Opinion Quarterly (24:2), pp. 280–296.
Thirty Sixth International Conference on Information Systems, Fort Worth 2015 16